The government has initiated a series of cybersecurity reforms to align itself with its Five Eyes counterparts, while simultaneously grappling with warnings from its intelligence agency that certain critical infrastructures are alarmingly subpar.
As cyber threats burgeon, security protocols remain inconsistent, the Government Communications Security Bureau (GCSB) disclosed to Members of Parliament.
“Regrettably, there exist… zones, specifically within our critical infrastructure, where cybersecurity barely meets the base standards we anticipate,” stated GCSB Director-General Andrew Clark during a select committee meeting on Wednesday.
The impetus for overhauling critical infrastructure protections in Australia stemmed from a 2022 breach involving Optus, which compromised the data of ten million customers.
This reform initiative in Aotearoa arose four years later, following two cyberattacks that compromised sensitive patient information from MediMap and Manage My Health.
The effort is safeguarded by a new cybersecurity strategy and action plan.
This strategy supersedes the 2019 framework, which was established prior to advancements in generative AI technologies such as ChatGPT.
The action plan prioritizes the safeguarding of “critical infrastructure,” commencing with consultations initiated last week that posed a fundamental question: Which critical infrastructures warrant protection?
The initial focus encompasses a broad spectrum, ranging from the electricity grid and telecommunications systems to healthcare and financial networks.
“In our hyper-connected era, the cyber threats looming over critical infrastructure are more intense and multifaceted than ever,” the Prime Minister’s Department emphasized in its online publication.
The Five Eyes alliance—comprising the United States, Canada, Australia, and the United Kingdom—has long since answered that pivotal question and has made significant strides.
In the United States, the identification of 16 critical sectors was accelerated after the 2021 Colonial Pipeline ransomware incident triggered widespread fuel shortages, prompting a shift from mere guidelines to stringent regulations.
Australia has delineated 11 key sectors (including communications, data processing, defense, energy, financial markets, food supply, healthcare, academia, space technologies, transport, and water management), spurring debate over compliance costs and penalties, simultaneously nurturing an entire industry focused on adherence. Critical systems are now classified at the ministerial level.
Enhanced protections mandate that entities implement personnel security plans and conduct AusCheck background checks for onshore critical personnel, at a minimum, every five years.
The director of Australia’s intelligence agency asserted in December that foreign hackers were actively targeting the nation’s critical infrastructure.
Clark informed the committee in Wellington that a recent tool assessing cyber threats to the nation had reported over one billion incidents.
Supply chains, encompassing digital links from private corporations to public entities, have surfaced as increasingly vulnerable, necessitating enhanced security measures for the private sector akin to those mandated for the public sector, as conveyed by intelligence agencies to MPs.
Recent analyses indicate that AI-powered agents (distinct from human actors) are significantly amplifying the scale and sophistication of cyber attacks.
Press reports from last week highlighted the sluggish pace in finalizing the new cybersecurity strategy, which was released just in time, considering these strategies are routinely revised every four years.
The new strategy is anchored on four foundational “pillars”: Understanding, Prevention and Preparation, Response, and Partnership.
The law firm Russell McVeagh posited that this strategy would impose “significant governance implications for organizations” by establishing explicit expectations for firms to enhance their security frameworks.
Clark also noted that while smaller enterprises may not fall under the category of critical infrastructure, they still handle a considerable amount of sensitive personal data in need of safeguarding.
“A crucial element is to provide adequate incentives for entities that manage such data to ensure proper security measures,” he asserted.
Russell McVeagh indicated that impending regulations aim to “better incentivize the safeguarding of personal information.”
As discussions surrounding critical infrastructure intensify, delineating what should be included is likely to be contentious, especially in light of ongoing deliberations regarding the designation of “essential infrastructure providers” under the Emergency Management Bill.
In a recent select committee, stakeholders questioned the exclusion of vital systems such as national weather radar, GNS, and other disaster monitoring mechanisms from the essentials list.
The second question posed during the consultation pertained to the appropriate depth of cyber defenses required for these infrastructure services.
It is essential to establish a “minimum level of cyber risk management,” particularly for entities affecting national security.

“Consultations with these key stakeholders are currently underway regarding potential cybersecurity regulations,” along with engagement with critical infrastructure providers and partners in the South Pacific, remarked Clark.
A sovereign data center designed to safeguard secrets and critical data was inaugurated in Auckland last June.
Source link: Rnz.co.nz.






